- Shopping Bag ( 0 items )
Want a NOOK? Explore Now
Sect. I | Security concepts | |
1 | Using models | 3 |
2 | Defining information security | 23 |
3 | Information as an asset | 41 |
4 | Understanding threat and its relation to vulnerabilities | 57 |
5 | Assessing risk variables : the risk assessment process | 71 |
Sect. II | The McCumber Cube methodology | |
6 | The McCumber Cube | 99 |
7 | Determining information states and mapping information flow | 111 |
8 | Decomposing the cube for security enforcement | 131 |
9 | Information state analysis for components and subsystems | 153 |
10 | Managing the security life cycle | 165 |
11 | Safeguard analysis | 177 |
12 | Practical applications of McCumber Cube analysis | 197 |
Sect. III | Appendices | |
App. A | Vulnerabilities | 223 |
App. B | Risk assessment metrics | 235 |
App. C | Diagrams and tables | 245 |
Overview